Advertisement

Drinking Water Critical Infrastructure and Its Protection

  • Rakesh Bahadur
  • William B. Samuels
Chapter
Part of the Protecting Critical Infrastructure book series (PCIN, volume 2)

Abstract

Drinking water in the United States has long been recognized as among the safest in the world, but the devastating events of September 11, 2001 brought water security to the forefront as a priority. Terrorist attacks against the United States and the consequent war on terrorism being waged by the United States and its allies have provided great impetus for the development of tools and technologies that can be utilized to detect and/or neutralize terrorist threats. One of the greatest concerns facing the nations is the intentional introduction of chemical, biological, or radiological (CBR) contaminants into the nation’s drinking water supplies. Damage to or destruction of the nation’s water supply and water quality infrastructure by terrorist attack could disrupt the delivery of vital human services, threatening public health and the environment, or possibly causing loss of life. This chapter deals with drinking water security tools and procedures. It also discusses the evolutionary concept of security in the water sector and the current state of technology.

Keywords

Vulnerability Assessment Water Utility Water Distribution System Critical Infrastructure Water Sector 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. ASCE. (2004). “Interim Voluntary Guidelines for Designing an Online Contaminant Monitoring System.” Publication No. 817R08007, http://www.asce.org/files/pdf/wise/3.pdf
  2. ASCE. (2006). “Guidelines for the Physical Security of Water Utilities.” Publication No. 817R08009, http://www.asce.org/files/pdf/wise/4.pdf
  3. AWWA. (2008). “Roadmap to Secure Control Systems in the Water Sector,” http://www.awwa.org/files/GovtPublicAffairs/PDF/WaterSecurityRoadmap031908.pdf
  4. Burrows, W. D., and Renner, S. E. (1999). “Biological Warfare Agents as Threats to Potable Water.” Environmental Health Perspectives, Vol. 107, No. 12, pp. 975–984.Google Scholar
  5. CBO. (1983). “Public Works Infrastructure: Policy Considerations for the 1980s.” U.S. Congressional Budget Office.Google Scholar
  6. Clark, R. M., and Deininger, R. A. (2000). “Protecting the Nation’s Critical Infrastructure: The Vulnerability of U.S. Water Supply Systems.” Journal of Contingencies and Crisis Management, Vol. 8, No. 2, pp.73–80.CrossRefGoogle Scholar
  7. Cristopher. G. W., Cieslak, T. J., Pavlin, J. A., and Eitzen, E. M. Jr. (1997). “Biological Warfare: A Historical Perspective.” JAMA, Vol. 278, No. 5, pp. 412–417.CrossRefGoogle Scholar
  8. Deininger, R. A. (2000). “The Threat of Chemical and Biological Agents to Public Water Supply Systems.” Science Applications International Corporation, McLean, VA.Google Scholar
  9. DHS. (2007). “Water: Critical Infrastructure and Key Resources; Sector-Specific Plan as input to the National Infrastructure Protection Plan.” Dept. of Homeland Security, http://www.dhs.gov/xlibrary/assets/nipp-ssp-water.pdf
  10. E.O. (1996). “Executive Order 13010 – Critical Infrastructure Protection.” Federal Register, Vol. 61, No. 138, pp. 37347–37350, July 17, 1996.Google Scholar
  11. E.O. (2001). “Executive Order 13228 – Establishing the Office of Homeland Security and the Homeland Security Council.” Federal Register, Vol. 66, No. 196, pp. 51812–51817, October 8, 2001.Google Scholar
  12. EPA. (2003). “Response Protocol Toolbox: Planning for and Responding to Drinking Water Contamination Threats and Incidents,” http://www.epa.gov/safewater/watersecurity/pubs/rptb_response_guidelines.pdf
  13. EPA. (2005a). “The Water Security Research and Technical Support Action Plan, Progress Report for 2005.” EPA National Homeland Security Research Center and Water Security Division, http://www.epa.gov/nhsrc/pubs/600r05104.pdf
  14. EPA. (2005b). “EPA Needs to Determine What Barriers Prevent Water Systems from Securing Known Supervisory Control and Data Acquisition (SCADA) Vulnerabilities.” Report No. 2005-P-00002, January 6, 2005.Google Scholar
  15. EPA. (2006). “A Water Security Handbook: Planning for and Responding to Drinking Water Contamination Threats and Incidents,” EPA 817-B-06-001.Google Scholar
  16. EPA. (2007a). “Contamination Warning System Deployment.” Office of Water, EPA 817-R-07-002, 2007, http://www.epa.gov/safewater/watersecurity/pubs/guide_watersecurity_securityinitiative _interimplanningpdf.pdf
  17. EPA. (2007b). “Standardized Analytical Methods for Environmental Restoration following Homeland Security Events.” EPA/600/R-07/136, http://www.epa.gov/NHSRC/pubs/600r07136.pdf
  18. Federal Register. (2005). Title 42- Public Health, Part 72 – Interstate Shipment of Etiologic Agents. http://www.access.gpo.gov/nara/cfr/waisidx_06/42cfr72_06.html
  19. Hart, D., McKenna, S., Klise, K., Cruz, V., and Wilson, M. (2007). “CANARY: A water quality event detection algorithm development tool.” Proceedings of the 2007 World Water and Environmental Resources Congress, May 15–19, 2007, Tampa, Florida, sponsored by the Environmental and Water Resources Institute of the American Society of Civil Engineers.Google Scholar
  20. Hawley, R. J., and Eitzen, E. M. (2000). “Bioterrorism and Biological Safety.” Diane O. Fleming and Debra L. Hunt (eds.) “Biological Safety: Principles and Practices,” 3rd edition. American Society for Microbiology (ASM) Press, Washington, DC, p. 784.Google Scholar
  21. Hickman, D. (1999). “A Chemical and Biological Warfare Threat: USAF Water Systems at Risk”. The Counter proliferation Papers, Future Warfare Series No. 3, http://www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.htm
  22. Hoover, J. E. (1941). “Water Supply Facilities and National Defense.” Journal of the American Water Works Association, Vol. 33, No. 11, pp. 1861–1865.Google Scholar
  23. HSPD-7. (2003). “Homeland Security Presidential Directive: Critical Infrastructure Identification, Prioritization, and Protection,” http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html
  24. Moteff, J., and Parfomak, P. (2004). “Critical Infrastructure and Key Assets: Definition and Identification.” October 1, 2004, Resources, Science, and Industry Division, Congressional Research Service, RL32631.Google Scholar
  25. Munro, N. B., Talmage, S. S., Griffin, G. D., Waters, L. C., Watson, A. P., King, J. F., and Hauschild, V. (1999). “The Source, Fate, and Toxicity of Chemical Warfare Agent Degradation Products.” Environmental Health Perspectives, Vol. 107, No. 12, pp. 933–974.Google Scholar
  26. Murray, R., Janke, R., and Uber, J. (2004). “The Threat Ensemble Vulnerability Assessment (TEVA) Program for Drinking Water Distribution System Security.” Proceedings of the 2004 World Water and Environmental Resources Congress, June 27–July 1, 2004, Salt Lake City, Utah, sponsored by the Environmental and Water Resources Institute and the American Society of Civil Engineers.Google Scholar
  27. Murray, R., Janke, R., Hart, W. E., Berry, W., Taxon, T., and Uber, J. (2008). “Sensor Network Design of Contamination Warning Systems: A Decision Framework.” Journal of the American Water Works Association, Vol. 100, No. 711, pp. 97–109.Google Scholar
  28. NAP. (2002). “Making the Nation Safer the Role of Science and Technology in Countering Terrorism.” National Academy Press, Washington, DC.Google Scholar
  29. NCPWI. (1983). “Fragile Foundations: A Report on America’s Public Works.” National Council on Public Works Improvement. Final Report to the President and Congress. Washington DC, February, 1988, p. 33.Google Scholar
  30. NRC. (1995). “National Research Council, Guidelines for Chemical Warfare Agents in Military Drinking Water.” PB95-267142.Google Scholar
  31. NSHS. (2002). “The National Strategy for Homeland Security.” U.S. Office of Homeland Security. July 16, 2002, http://www.whitehouse.gov/homeland/book/nat_strat_hls.pdf
  32. NSPP. (2003). “The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets.” Office of the President. February, 2003. p. 71, http://www.whitehouse.gov/pcipb/physical_strategy.pdf
  33. PDD-63. (1998). “The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive No. 63.” White Paper, May 22, 1998.Google Scholar
  34. Sandia. (2002). “Risk Assessment Methodology for Water (RAM™)Google Scholar
  35. Skasden, J., Janke, R., Grayman, W., Samuels, W., TenBroek, M., Steglitz, B., and Bahl, S. (2008). “Distribution system monitoring for detecting contamination events and water quality changes.” Journal of the American Water Works Association, Vol. 100, No. 7, pp. 81–94.Google Scholar
  36. Stamp, J., Dillinger, J., Young, W., and DePoy, J. (2003). “Common Vulnerabilities in Critical Infrastructure Control Systems.” (2nd edition, 22 May 2003; revised 11 November 2003),” Sandia National Laboratories, http://www.oe.netl.doe.gov/docs/prepare/vulnerabilities.pdf

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Science Applications International Corporation Center for Water Science and EngineeringMcLeanUSA

Personalised recommendations